NEWS
Experts find Office XML docs may slow antivirus scanners (CNET)
Security experts are warning beta users of Microsoft Office 2003 that its XML-based format could impede antivirus software. Experts said the problem occurs when documents are saved as XML files. Saving files as XML could move a macro embedded in that file to a location other than where they are always positioned. Scanners, as a result, must examine the entire file. Antivirus experts want a header placed in the file telling the scanner where to look for macros. Microsoft, meanwhile, said this is a problem with XML documents and not specific to Office 2003.
NEWS
Microsoft details DSI autonomic architecture (InfoWorld)
Microsoft provided details on its new Dynamic Systems Initiative software architecture that enables enterprise and third-party developers to create applications with autonomic capabilities. This is Microsoft's response to self-healing, self-managing technology from IBM, HP and Sun.
DAILY HEADLINES
All headlines, including those below, are available from our news page.
![]()
FEATURED TOPIC
Microsoft's management gambit
What's in store for Windows enterprise management? Find out about Redmond's bold new gambit. The centerpiece of the strategy (circa 2006) is autonomic computing, but you'll see hints of things to come with SMS 2003 and MOM 2004.
SPONSORED BY: Research in Motion
![]()
FREE WHITE PAPER: SECURE WIRELESS ACCESS TO WHAT YOU NEED
Provide your mobile professionals with secure wireless access to e-mail, data and communications using the BlackBerry wireless solution. At the core of the BlackBerry enterprise solution is BlackBerry Enterprise Server software. Learn about the features and functionality of the latest version of BlackBerry Enterprise Server by downloading the white paper for BlackBerry Enterprise Server v3.5 for Microsoft Exchange.
![]()
Get your free copy here. |
IT SURVIVAL KIT
The secrets to 401(k) success
This tip gives you some suggestions for optimizing your 401(k) plan, whether you've gotten burned by the dot-com blast or not. So, go invest, but do so wisely.
ASK ROBERTA BRAGG
The classic leaky server problem
Dear Roberta:
When I came in on a Monday morning, I found all of my user accounts with admin rights were locked out. I used EDR 2002 to regain access to my PDC (NT4 server SP6a) with admin rights and checked the log files on the primary domain controller (PDC). I found out someone from a machine with a domain name that no one in our company is using tried to log on to my PDC with all of the user names with admin rights. Because we use very strong passwords and only allow three tries for logon, this "hacker" was not able to log on to my PDC. How did this guy know all of my user names that have admin privileges?
Click here for Bragg's expert response.
BEST WEB LINKS
Book excerpts
Click over to our newest BWL category for access to free chapter downloads. You heard right -- free. Stay tuned to this Best Web Links category for more chapters.
SEARCHWIN2000.COM SURVEY
How's Microsoft doing?
How valuable is Active Directory to your organization? Does Microsoft support leave something to be desired? Take this 10-minute survey and help us prepare Microsoft's report card for 2003.
THE MISSING LINK
Can you hack it? Microsoft to help teach Hacking 101
![]()
In a move that seems akin to teaching a fox how to guard a henhouse, Microsoft -- the most vulnerable IT henhouse of all -- is teaming up with several universities to teach students how to break Windows. As part of the computer course, undergrads will have to hack into software and fix any security bugs they find. They'll also have to deal with security vulnerabilities and learn how to write secure code. The University of Leeds in England will offer the course next year, with the help of Microsoft's money. MS may want to make sure that every one of the male students in the class has a girlfriend; according to a leading security expert, most virus writers don't.
|
|
![]() |
![]() |
|
Sign up for our Windows in the Enterprise tip today!
|
![]() |
| Enter your email and start receiving Windows 2000 in the Enterprise - Best practices for deployment and management in business. |
![]() |
![]() |
| Email: |
|
|
Not a member? We'll activate your membership with your subscription. |
![]() |
|
|
![]()
![]()
NEWS EDITOR
John Hogan
[EMAIL PROTECTED]
Send me your news, press releases and product announcements.
![]()
SENIOR SITE EDITOR, SEARCHWIN2000.COM & SEARCHWINDOWSMANAGEABILITY.COM
Marilyn Cohodas
[EMAIL PROTECTED]
Send me your original articles and best practices.
![]()
SITE EDITOR, SEARCHWIN2000.COM & SEARCHWINDOWSMANAGEABILITY.COM
Catherine Ketcher
[EMAIL PROTECTED]
Send me your bloopers and Featured Topic ideas.
![]()
SENIOR NEWS WRITER
Margie Semilof
[EMAIL PROTECTED]
Send me your news and story ideas.
![]()
NEWS WRITER
Matthew A. DeBellis
[EMAIL PROTECTED]
Send me your Windows manageability news and press releases.
![]()
ASSOCIATE EDITOR
Christine Polewarczyk
[EMAIL PROTECTED]
Send me your ideas for webcasts and discussion day topics.
![]()
ASSISTANT EDITOR
David Pye
[EMAIL PROTECTED]
Send me your tips and your true IT bloopers.
![]()
ASSISTANT EDITOR
Dana McCurley
[EMAIL PROTECTED]
Send me your favorite Web sites and white papers.
![]()
SENIOR ACCOUNT EXECUTIVE
Mike Kelly
[EMAIL PROTECTED]
Contact me to sponsor this or any other TechTarget newsletter.
|